enabled applications marketing guide q1 2015 · 2015-10-05 · enabled applications marketing guide...

54
5 th Generation Intel® Core™ vPro™ Processors Enabled Applications Marketing Guide Q1 2015

Upload: others

Post on 26-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

5th Generation Intel® Core™ vPro™ ProcessorsEnabled Applications Marketing Guide

Q1 2015

Page 2: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Legal Notices and Disclaimers

10/5/2015 2

INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.

A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS.

Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request.

Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.

Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.

All products, computer systems, dates and figures specified are preliminary based on current expectations, and are subject to change without notice.

All products, platforms, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. All dates specified are target dates, are provided for planning purposes only and are subject to change.

This document contains information on products in the design phase of development. Do not finalize a design with this information. Revised information will be published when the product is available. Verify with your local sales office that you have the latest datasheet before finalizing a design.

Code names featured are used internally within Intel to identify products that are in development and not yet publicly announced for release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion or marketing of any product or services and any such use of Intel's internal code names is at the sole risk of the user.

Intel, Intel Inside, Intel Atom, vPro and Intel Core are trademarks of Intel Corporation in the U.S. and other countries.

Other names and brands may be claimed as the property of others.

Copyright © 2015, Intel Corporation. All rights reserved.

Page 3: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Added 5th generation processor Production Wins

Updated descriptions of all 4th generation processor applications

Added Microsoft SCCM information

Updated product links

Contacts identified for all apps

Included all previous Manageability applications

What’s New in this Update

10/5/2015 3

Page 4: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Contents

Intel Core vPro technology

Security and Data Protection solutions

Management solutions

Compute Model Flexibility solutions

10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 4

Page 5: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Platform

10/5/2015 5

Use

rIT

Intel® Active Management Technology

(AMT)

Intel® SSD Pro SeriesData Protection

Intel® Trusted Execution Technology (TXT)and Virtualization Technology (VT)

Network

Intel® LAN/WLAN controller

Chipset

Intel® Express Chipset

Processor

Intel® Core™ processors

Intel® HD and Iris GraphicsIntel® Pro

Wireless DisplayIntel® Wireless Gigabit

Docking

High-performingIntel® Core™ vPro™

processor based devices

Intel® vPro™ Platform is the sum of hardware, BIOS extensions and applications that deliver solutions for businesses

Page 6: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

5th Generation Intel® Core™ vPro™ and Intel® Core™ M vPro™ Platform

10/5/2015 6

No Wires

Secure

Intel® Core™ vPro™ Processors• High performance processor, enhanced battery life1

• 2 in 1 convertibles, Ultrabook™, thin clamshells

Intel® Core™ M vPro™ Processors• Balanced processor performance, battery life2

• Tablets, 2 in 1 detachables, ultra-thin clamshells

Intel® Pro Wireless Display• Presentation controls and privacy

• Enhanced security and network protection3

Intel® Wireless Gigabit Docking• Convenient and quick docking

• Secure connection with remote management

Intel® Active Management Technology• Remote KVM control over wireless networks

Intel® Setup and Configuration Service• New configuration and fine-tune controls

Delivering new productivity experiences for the business user

New data protection. Enhanced authentication.

Innovative 14nm designs, setting new standard for business PCs

Intel® SSD Pro 2500 Series• Data productivity with automatic drive encryption• Supports new OPAL 2.0 usages

Enhanced Identity Protection (IPT)• Simplifying authentication; hardware-strength enhancements

Manageable

Stylish & Robust

Leading-edge security for an unwired workplace

Mobile manageability made easier

1 4th gen Intel® Core™ vPro™ (Y-Series) vs Intel® Core™ M vPro™ processor2 4th gen Intel® Core™ vPro™ (U-Series) vs 5th gen Intel® Core™ vPro™ (U-Series) processor3 Intel® Wireless Display v5.1 vs Intel® Pro Wireless Display v5.1

Page 7: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel vPro Technology Value Proposition

10/5/2015 7

Intel® Core™ M vPro™ and 5th generation Intel® Core™ vPro™ platforms

vPro: the systems workers want to get their hands on, so secure/manageable IT won't have to...

Increase organizational efficiency, and enhance security while providing workers with flexible tools to be most productive

• Intel® SSD Pro 2500 with OPAL 2.0 support• Intel® Active Management Technology with Microsoft* InstantGo support

Enhance collaboration and increase worker productivity by removing burdens of wires, dongles and passwords

• No Wires: Intel Pro WiDi 5.1 and Intel® Wireless Gigabit Docking• No Password: Intel® Identity Protection Technology• Built-In Visuals: Stunning processor graphics for business applications

IT End-user

New Capabilities for IT & End Users

Intel® Identity Protection Technology

No Passwords

Intel® SSD Pro 2500

Data Security No Wires

Intel® Pro WiDi 5.1Intel® Wireless Gigabit Docking

Intel® HD Graphics

Built-In Visuals

Page 8: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Delivering the Best Experience with Intel® vPro™ Technology

10/5/2015 8

Security & Data Protection

Intel® SSD Pro 2500 Series Intel® SSD Pro 2500 Series (OPAL 2.0 usage)

Manageability

Intel® Active Management Technology

Intel® Setup and Configuration SWMeshCentral (Open Source SW)

Compute Model Flexibility

Intel® GVT VMCS ShadowingIntel® Trusted Execution Technology

Intel® Identify Protection Technology

Identity Protection Data EncryptionSecure Managed

ContainersIntel® Digital Fence

Remote, Out-of-Band Discover, Manage, Configure Graphics Virtualization Secure Client Virtualization

Enterprise Data Security

Intel® SSD Pro 2500 Series (OPAL 2.0 usage)

BDW-NI/AES-NI/TSX-NIIntel® Secure Key Technology

Additional software and non-client hardware may be required for solution implementation.See capability readiness and availability indicators to reference when certain capabilities/usages are available and current maturity stage.All capabilities, targets and availability is subject to change without notice

Productivity & Collaboration

Intel® Pro WiDi 5.1 Intel® Wireless Gigabit Industry-specific usages Intel® HD Graphics Microsoft* InstantGo SupportIntel® Smart Connect TechnologyIntel® Ready Mode Technology

Wireless Display Wireless Docking Location Based Services Business GraphicsAlways Fresh Data and

Responsiveness

Page 9: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Enabled Partner Applications Portfolio

10/5/2015 9

Security and Data Protection

Absolute Software Computrace

Absolute Software LoJack

Absolute Software Data Protect

Charismathics CSSI

Cisco AnyConnect

HID ActivClient

McAfee Intel Management Technologies

McAfee Data Protection

McAfee Risk & Compliance

Microsoft Bitlocker Drive Encryption

OpenSSL SSL Library

RSA BSAFE

RSA SecurID Software Tokens

Symantec Endpoint Encryption

Symantec Managed PKI

WinMagic SecureDoc

WolfSSL SSL Library

Manageability

Accenture ARROW

AeroScout MobileView

Atos Remote PC Management

AVG Managed Workplace

Bomgar Bomgar

Compucom EUC WorkBench

Continuum Platform Remote Monitoring and Management

Dell Kace K1000 Management Console

GeneralSoft Desktop Terminal Management

Kaseya Virtual System Administrator

LabTech Remote Monitoring and Management

LANDesk Management Suite

McAfee ePO Deep Command

Microsoft System Center Configuration Manager

N-able N-central

RealVNC VNC Viewer Plus

Spiceworks Spiceworks IT

Symantec Client Management Suite

Virtualization

Bromium vSentry

Citrix XenClient Enterprise

Page 10: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

36pt Intel Clear Section Break Page Example

10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 10

Security and Data Protection

Page 11: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel vPro Technology Features: Mapping to IT Security Pillars

10/5/2015 11

Malware Resiliency Identity Data Protection

Threats find nowhere to run or hide

• Intel® Trusted Execution Technology

• Intel® Platform Protection Technology with AES-NI

• Intel® Data Protection Technology with Secure Key

Always updated robust systems

• Intel® Platform Protection Technology with BIOS Guard (PFAT)

• McAfee* ePolicy Orchestrator/ Deep Command/Risk Advisor

Simple access with hardware-strength security

• No Password VPN using IPT with PKI

• Hardware-strength identity protection using IPT with MFA

Data safe from theft or alteration

• Intel® SSD Pro series

• Intel® Digital Fence solution and secure containers available on Intel SSD Pro series drives

Page 12: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data Protection

Absolute Computrace provides a robust, multi-layered security solution to enable organizations to address issues of regulatory compliance, data protection, computer theft recovery, and asset tracking. Computrace supports Intel® Anti-theft Technology to lock lost stolen laptops.

Benefits When Used with Intel® vPro™ Technology

Detect and respond to theft even when the PC is offline.

Delete software-based encryption keys, prevent the PC from booting, or both.

Rapidly reactivate a system through a local passphrase or a remotely generated unlock token.

Allows robust policies to be pushed to device for local enforcement

Absolute Computrace

10/5/2015 12

SHOWCASES:

• Pro SSD

Link:

Contact: Shari Hamlin

4th generation

Computrace

Page 13: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data ProtectionAbsolute Software LoJack

10/5/2015 13

SHOWCASES:

• Pro SSD

Link:

Contact: Shari Hamlin

4th generation

LoJack

Absolute LoJack theft recovery solutions will aid in the recovery of a stolen laptop, smartphone or tablet and return to its owner. Locate a device, lock it against unauthorized users and permanently erase files, all from a remote location. Even if thieves reset the device to factory settings or wipe the hard drive, patented Absolute persistence technology re-installs the software despite their best efforts. User identity and data are protected.

Benefits When Used with Intel® vPro™ Technology

Detect and respond to theft even when the PC is offline.

Delete software-based encryption keys, prevent the PC from booting, or both.

Rapidly reactivate a system through a local passphrase or a remotely generated unlock token.

Allows robust policies to be pushed to device for local enforcement

Page 14: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data ProtectionAbsolute Software Data Protect

10/5/2015 14

SHOWCASES:

• Pro SSD

Link:

Contact: Shari Hamlin

4th generation

Data Protect

Installing Absolute Data Protect on a laptop, tablet or smartphone lets it be located, locked from unauthorized use and sensitive data permanently erased all from a remote location. Important files, saved passwords and personal information are secure and user identity safe.

Benefits When Used with Intel® vPro™ Technology

Locate lost devices using Wi-Fi, GPS or IP geolocation

Device lock to prevent unauthorized access on laptops

Permanently erase files with personal information

Page 15: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data ProtectionCharismathics Smart Security Interface (CSSI)

10/5/2015 15

SHOWCASES:

• IPT-PKI

Link:

Contact: Paul Carbin

5th generation

CSSI

The Charismathics smart security interface© is a fully configurable PKI client that implements the cryptographic functions implemented in Intel® IPT with PKI. It also supports most smart phones, and all TPM platforms and thumb drives worldwide. It allows creating data structures for literally any application or specification. It is used for certified digital signatures. It is independent of hardware and PC client software.

Benefits When Used with Intel® vPro™ Technology

Instead of handling additional hardware and software, such as smart cards, readers, drivers, printers and messing around with requirements from many different groups of your organization, you will now issue your certificates right into the heart of the Intel Core, and serve all authentication and encryption demands that you need to support.

Page 16: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data Protection

Cisco AnyConnect is a unified agent that delivers multiple security services to help enable and protect the enterprise. It provides the visibility and the control to identify who and what is accessing the extended enterprise before, during, and after an attack. The Cisco AnyConnect Secure Mobility Solution offers a comprehensive endpoint security platform with remote access functionality, posture enforcement, and web security features.

Benefits When Used with Intel® vPro™ Technology

Enable mobile users to easily and securely access the network with any mobile device.

Easily manage the security risks of borderless networks.

Optimized for Identity Protection with PKI

Cisco AnyConnect

10/5/2015 16

SHOWCASES:

• IPT-PKI

Link:

Contact: Andy Weidner

5th generation

AnyConnect

Page 17: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data Protection

ActivClient allows organizations to deploy the best strong authentication solution for their environment. Choosing from a range of credential options, including smart cards and USB tokens. The strong authentication solution is also available for all major mobile platforms, enabling organizations to protect their resources whether accessed from a desktop, laptop, tablet or smartphone.

Benefits When Used with Intel® vPro™ Technology

Increase security: ActivClient offers a user-friendly strong authentication experience.

Improve compliance: Complies with all major government and industry regulations.

Optimize productivity: Single, versatile strong authentication tool for both Windows Login and Remote Access

Reduce costs: Integrates easily into existing infrastructure

HID ActivClient

10/5/2015 17

SHOWCASES:

• NFC with tap-to-login to Windows

Link:

Contact: Naveen Doddapuneni

5th generation

ActivClient

Page 18: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data Protection

McAfee ePolicy Orchestrator (ePO) Deep Command enables remote assistance and remediation with ePO-class scalability. McAfee Endpoint Encryption provides full disk encryption utilizing Intel® AES-NI to protect data from unauthorized access, loss, and exposure with integrated unique out-of-band centralized management.

Benefits When Used with Intel® vPro™ Technology

Unlock PCs, reset passwords, and perform remediation remotely.

Protect client PCs even when powered off—saving energy.

Effectively manage thousands of endpoints with Intel® AMT technology.

Gain immediate access to endpoints even when network access is compromised.

McAfee ePolicy Orchestrator Deep Command

10/5/2015 18

SHOWCASES:

• AES-NI

Link:

Contact: Naveen Doddapuneni

5th generation

ePO DeepCommand

Page 19: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data ProtectionMcAfee Data Protection

10/5/2015 19

SHOWCASES:

• AES-NI

Link:

Contact:

5th generation

Data Protection

Safeguard critical data and help ensure regulatory compliance with McAfee Data Protection solutions. Encryption options include enterprise-grade drive encryption or management of native encryption. Available individually or in suites, McAfee Complete Data Protection Suites and McAfee Data Loss Prevention solutions provide multilayered protection for your data regardless of where it resides — on the network, in the cloud, or at the endpoint.

Benefits When Used with Intel® vPro™ Technology

Delivers Near Native Performance : Highly optimized use of Intel’s AES-NI makes encryption transparent to end user

Extends the Reach of IT : Integrate with Intel’s vPro™ AMT to allow IT to reach/encrypt/manage systems anywhere

Makes Security Seamless : Leverage TPM hardware to provide another secure option for pre-boot authentication

Helps Prevent Cold Boot Attacks : Seamlessly move encryption keys from insecure RAM to secure Intel hardware in Connected Standby

Accelerates Storage Performance and Lower TCO : Support for Intel® SSD Professional Family (instant Opal activation, HW-based encryption, zero performance impact)

Page 20: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data ProtectionMcAfee Total Protection for Compliance

10/5/2015 20

SHOWCASES:

• xxx

Link:

Contact: Naveen Doddapuneni

5th generation

Total Protection

McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess, and report across managed and unmanaged systems, reducing the time and effort required for IT audits from weeks to days. McAfee® Total Protection for Compliance combines the power of McAfee Vulnerability Manager and McAfee Policy Auditor, and integrates them with McAfee® ePolicy Orchestrator (McAfee ePO™) to create a single platform for deployment, management, risk analysis, and compliance reporting.

Benefits When Used with Intel® vPro™ Technology

Simplifies compliance coverage through unified IT policy auditing

Delivers the most effective technology approach by supporting both agent and agentless scans

Automates time-consuming audit tasks by consolidating network and host-based assessments

Enhances and optimizes existing investments in security management infrastructure

Increases the value of security protection through McAfee’s advanced countermeasure aware risk management technology

Reduces audit preparation time by supporting automated industry standards content

Page 21: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data Protection

BitLocker Drive Encryption* enhances data protection by bringing together two major sub-functions: drive encryption and integrity checking of early boot components.

Benefits When Used with Intel® vPro™ Technology

Accelerate AES-NI encryption operations.

Prevent unauthorized users from accessing files, including swap and hibernation files.

Perform integrity checking on early boot components for increased security before data decryption.

Microsoft BitLocker Drive Encryption

10/5/2015 21

SHOWCASES:

• AES-NI

Link:

Contact: Shari Hamlin

5th generation

BitLocker

Page 22: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data Protection

The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, open source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols as well as a full-strength general purpose cryptography library.

Benefits When Used with Intel® vPro™ Technology

Support multiple cryptographic algorithms, including AES-NI as Intel® Secure Key.

Open SSL Library

10/5/2015 22

SHOWCASES:

• AES-NI

Link:

Contact: Shari Hamlin

5th generation

OpenSSL

Page 23: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data ProtectionRSA BSAFE

10/5/2015 23

SHOWCASES:

• AES-NI

• BDW-NI

• Secure-Key

Link:

Contact: Shari Hamlin

5th generation

BSAFE

RSA BSAFE security software products enable developers to meet the wide-ranging security goals of their applications. BSAFE software is available in C/C++ and Java. It combines core security functionality into one common, interoperable, and flexible set of libraries.

RSA BSAFE Crypto Kernel offers versions of popular cryptographic algorithms optimized for both small code size and high performance. Unlike alternatives such as open source, our technology is backed by highly regarded cryptographic experts.

Benefits When Used with Intel® vPro™ Technology

Crypto Kernel supports the most commonly used ciphers, digests and algorithms.

Algorithms are optimized for high performance and small code size

Page 24: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data ProtectionRSA SecurID Software Tokens

10/5/2015 24

SHOWCASES:

• IPT-PKI

Link:

Contact: Shari Hamlin

5th generation

SecureID

SecurID Software Tokens reduce the number of items a user has to manage for safe and secure access to corporate assets. It can streamline the workflow for distributing and managing two-factor authentication for a global workforce. Companies can revoke and recover software tokens when someone leaves the company or loses a device, eliminating the need to replace tokens.

Benefits When Used with Intel® vPro™ Technology

Strong two-factor authentication to protected network resources

Software token automation for integration with available RSA SecurID Partner applications

Silent installation and silent upgrade

Multiple token provisioning options including Dynamic Seed Provisioning (CT-KIP)

Web plug-in for fast access to protected web sites with Microsoft Internet Explorer

Interoperability with Windows screen readers for visually impaired users

Page 25: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data Protection

Symantec Endpoint Encryption combines strong full-disk and removable media encryption with an intuitive central management platform to protect sensitive data from loss or theft and help administrators prove a device was encrypted should it go missing.

Benefits When Used with Intel® vPro™ Technology

Maximize encryption speed with Intel® Advanced Encryption Standard Instructions (AES-NI) support.

Symantec Endpoint Encryption

10/5/2015 25

SHOWCASES:

• IPT-PKI

Link:

Contact: Paul Carbin

5th generation

Endpoint

Page 26: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data Protection

Symantec Managed PKI Service is a trusted cloud-based service that secures mission-critical interactions. Built on Symantec’s proven, globally managed, highly reliable infrastructure, Symantec Managed PKI Service enables organizations to issue, renew, and revoke digital certificates which can be used for strong authentication, encryption, and digital signing applications.

Benefits When Used with Intel® vPro™ Technology

Utilizes Intel® Identity Protection Technology with Public Key Infrastructure (PKI) support.

Symantec Managed PKI

10/5/2015 26

SHOWCASES:

• IPT-PKI

Link:

Contact: Paul Carbin

5th generation

Managed PKI

Page 27: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data Protection

WinMagic SecureDoc offers hybrid Full Disk Encryption for client-server architecture. SecureDoc* also supports Intel® Anti-Theft Technology to provide additional layer of security to protect laptop and data.

Benefits When Used with Intel® vPro™ Technology

Removable Media Encryption

Manage hard drive encryption through a heterogeneous management console

Manage encrypted SSDs and Seagate and Opal hard drives

Disable access to encrypted data and laptop by locking a lost/stolen laptop using Anti-Theft Technology

Protect encrypted data in S3 sleep state

WinMagic SecureDoc

10/5/2015 27

SHOWCASES:

• Pro SSD

Link:

Contact: Shari Hamlin

4th generation

SecureDoc

Page 28: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Security and Data ProtectionwolfSSL

10/5/2015 28

SHOWCASES:

• AES-NI

Link:

Contact: Shari Hamlin

5th generation

wolfSSL

wolfSSL is a low resource C-language-based SSL/TLS library targeted for environments from IoT devices to the Cloud because of its speed and portability. As a low power consumer wolfSSL is perfect for server farms as well. wolfSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, offers a simple API, FIPS, an OpenSSL compatibility layer, OCSP, and offers several progressive ciphers.

Benefits When Used with Intel® vPro™ Technology

First TLS provider to fully utilize vPro(tm) Technology

Hyper optimized allowing superior scalability

Fastest crypto solution from AES to SHA2 to public key operations

wolfSSL

Page 29: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

36pt Intel Clear Section Break Page Example

10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 29

Manageability

Page 30: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Manageability: Greater Control Regardless of Device Type or Device State

10/5/2015 30

2-in-1

All-In-One PCs

Ultrabook™

Discover, manage and configure devices remotely while minimizing end-user downtime

Remote, out-of-band manageability allows IT to save time and money on disk reimaging

Page 31: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

ManageabilityAccenture ARROW

10/5/2015 31

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Serial Over LAN

Link:

Contact: Dena Lumbang

4th generation

ARROW

Accenture Remote Resolution Online Workforce (ARROW) is a global service that packages a team of skilled resources, great Intel technology, workflow tools and automation to deliver an elevated level of end user support to enterprises. Hardware-based KVM remote control enable remote diagnostics and repair. A remote “poison pill” can be sent to a lost device rendering it inoperable. A stolen PC’s hard drive remains encrypted and locked from thieves.

Benefits When Used with Intel® vPro™ Technology

Significantly decreases help desk response time

Delivers an average 30-40% better agent productivity

Automation starts immediately after connection

• Intel® SCS

Page 32: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

AeroScout products combine real-time location, auto-identification, wireless sensing and telemetry technologies to automate business processes and deliver context-aware applications. Real-Time Visibility solutions from AeroScout go beyond standalone RFID, RTLS and sensor solutions by unifying all enterprise visibility data on a single Wi-Fi-based platform.

Benefits When Used with Intel® vPro™ Technology

Now Intel and AeroScout have joined forces to deliver seamless Wi-Fi based indoor location services on Intel-based devices. Powered by AeroScout Wi-Fi tags integrated directly into devices, the Intel® vPro Technology, Location-Based Service uses existing Wi-Fi enterprise infrastructures to help locate people and assets.

AeroScout MobileView

10/5/2015 32

SHOWCASES:

• Wi-Fi HW

• Location based services

Link:

Contact: Andy Weidner

4th generation

MobileViiew

Page 33: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

As a service provider, Atos uses Intel vPro technology features to reduce the number of Desk-side visits traditionally required to manage and maintain systems at customer sites, minimizing business interruptions for its customers while lowering the customer’s total cost of ownership.

Benefits When Used with Intel® vPro™ Technology

Atos estimated improvements:

reduce time to discover and provision new PCs by 35 percent

Reduce manual inventories by 95 percent

Eliminate manual BIOS updates

Reduce time to update firmware by 85 percent

Atos Remote PC Management

10/5/2015 33

Link:

Contact: Trevor Lawless (SMG)

White Paper

5th generation

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Serial Over LAN

• Intel® SCS

Page 34: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

An award-winning remote monitoring and management software application for technology providers servicing small and mid-sized customers. Leverages the capabilities of Intel vPro technology to provide comprehensive remote monitoring and management.

Benefits When Used with Intel® vPro™ Technology

Reduce desk-side and service depot visits by resolving problems quickly from the management console — even if a PC is powered off or in standby mode, is connected to a wireless network, or has an unresponsive operating system.

Automated proactive alerts identify issues before they escalate into problems or require costly repairs.

Secure remote power-up and power cycling allow scheduled maintenance, backups and monitoring to be performed after hours, avoiding interruptions to business.

Remote POST and BIOS access improves ability to remotely debug issues.

Encrypted, remote security updates help ensure that security patches are up to date and speed the deployment of critical patches, even to systems that are off or down.

Remote asset-tracking eliminates time-consuming manual inventory of hardware and software and is possible even if a system is off or down.

AVG Managed Workplace (formerly Level Platforms)

10/5/2015 34

Link:

Contact: Dena Lumbang

Managed Workplace

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Serial Over LAN

4th generation

Page 35: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

Bomgar enables IT to support all of their systems over the web, through its secure appliance tool. Because all supported platforms are included in the core product, IT can resolve issues spanning multiple systems without creating multiple audit trails. Supporting everything with one solution speeds incident handling time and support rep productivity.

Benefits When Used with Intel® vPro™ Technology

Troubleshoot PCs with or without user participation

Reboot system to clean state, or redirect boot device

Watch BIOS, drivers, and OS attempt to load to identify problems with the boot process

Rebuild OS, fully reimage hard drive, or edit BIOS settings remotely

Perform OS migrations and application upgrades remotely

Bomgar

10/5/2015 35

Link:

Contact: Dena Lumbang

5th generation

Bomgar

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Serial Over LAN

• Intel® SCS

Page 36: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

CompuCom’s EUC Workbench™ is a combination of tools that allows any support-related personnel, such as service desk agents and network administrators, to take hardware control of a remote client— and perform a variety of hardware and software diagnostics and repair without a physical desk side support visit.

Benefits When Used with Intel® vPro™ Technology

Remote diagnostic and repair: Resolve PC problems from console managed by CompuCom’s Service Desk, even if the PC is powered off, in standby, (NOT) connected to WiFi, or has a disabled OS

Automated alerts: Identify issues in advance, such as disabled software, hard drive health, and memory usage

Secure remote power up and power cycling: Perform scheduled maintenance, backups, and monitoring

Encrypted, remote security updates and remote access tracking: Even if systems are off or down

Compucom EUC WorkBenchTM

10/5/2015 36

Link:

Contact: Dena Lumbang

4th generation

EUC WorkBench

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Serial Over LAN

• Audit Log

• Alarm Clock

• Intel® SCS

Page 37: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

ManageabilityContinuum Platform Remote Monitoring and Management

10/5/2015 37

SHOWCASES:

• Intel® SCS

Link:

Contact: Dena Lumbang

5th generation

RMM

Continuum RMM is delivered via a SaaS-based management portal, and dramatically increases operational efficiency – allowing users to easily monitor, troubleshoot, and maintain desktops, servers, mobile devices and other endpoints for clients. The platform also includes alerting, integrated ticketing, automated recommendations, remote control, scripting, patch management, antivirus software, and reporting.

Benefits When Used with Intel® vPro™ Technology

Discovery: Identify the platform capabilities and the state of Intel® Active Management Technology

Page 38: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

The Dell KACE Family of Systems Management Solutions provides comprehensive management for servers, PCs, Macs, Chromebooks, smartphones, tablets, printers, networking gear and other connected non-computing devices. Our solutions are affordable and easy to deploy and use. In addition, they can fulfill the systems management needs of organizations of all sizes, from initial computer deployment to ongoing management and retirement.

Benefits When Used with Intel® vPro™ Technology

Discovery: Identify the platform capabilities and the state of Intel® Active Management Technology

Dell/Kace K1000 Management Console

10/5/2015 38

SHOWCASES:

• Intel® SCS

Link:

Contact: Dena Lumbang

4th generation

Kace Management

Page 39: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

GeneralSoft Terminal Management gives IT administrators powerful tools for managing end clients, applications, and computer networks. It can remotely determine software and hardware information, monitor computer state, prevent virus invasion, malicious scanning and support remote diagnosis for everyday maintenance.

Benefits When Used with Intel® vPro™ Technology

Manage clients regardless of system state and location inside or outside of the corporate network.

Better access clients and troubleshoot user problems with enhanced remote control and diagnosis.

Receive alerts about abnormal events, such as agent removal or malicious attack.

GeneralSoft Desktop Terminal Management

10/5/2015 39

SHOWCASES:

• Intel® SCS

Link:

Contact: Templor Du

5th generation

Terminal Management

Page 40: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

Kaseya VSA is a comprehensive IT management solution that offers MSPs and IT departments the most powerful tool on the market for centrally managing and automating all of IT.

Benefits When Used with Intel® vPro™ Technology

Remotely remediate blue screen, network adapter failure, OS corruption and other problems.

Remotely power up, power down, and reset PCs.

Shift software updates, patch management, and more to off-hours when they won’t interfere with customer productivity.

Kaseya Virtual System Administrator (VSA)

10/5/2015 40

Link:

Contact: Dena Lumbang

5th generation

VSA

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Intel® SCS

• Win 8.1 (MDM)

Page 41: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

LabTech improves an IT solution provider’s service offering through remote support that results in improved technician efficiency, added flexibility and dramatic cost reduction while driving IT automation into your business. With its latest features and enhancements, LabTech delivers increased speed, real-time agent deployment status and unprecedented centralized visibility into customers’ systems.

Benefits When Used with Intel® vPro™ Technology

For an OS issue: Intel® vPro™ technology has a remote control KVM that is supported natively gives the ability to work on the machine at the BIOS level, which speeds the repair of multiple types of problems and saves the cost of truck rolls to diagnose & repair the problem.

For a hardware issue: Diagnose the issue remotely and send a technician out once with the right part, instead of twice.

LabTech Remote Monitoring and Management

10/5/2015 41

Link:

Contact: Dena Lumbang

5th generation

RMM

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Intel® SCS

• Graceful

Shutdown

• Win 8.1 (MDM)

Page 42: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

LANDESK® Management Suite increases user and IT productivity. It helps IT administrators automate software and OS deployments, fix user issues quickly, and track software assets. This flagship solution positions LANDESK as a leader in Gartner’s Magic Quadrant for Client Management Tools.

Benefits When Used with Intel® vPro™ Technology

Authenticate and broker out-of-band communications with clients outside the corporate network

Troubleshoot user problems regardless of system and OS state with pre-boot remote control and agent-based video redirection

Push patches to PCs that have been shut down for faster patch saturation, greater worker productivity, and reduced energy bills

LANDESK Management Suite

10/5/2015 42

Link:

Contact: Dena Lumbang

4th generation

Client Management Suite

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Serial Over LAN

• Graceful

Shutdown

• Host Based

• Configuration

Page 43: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

McAfee ePO Deep Command software paired with Intel® AMT helps manage security administrators lower costs by streamlining endpoint management. With the ability to remotely manage PC’s when issues arise like security incidents and forgotten encryption passwords, the need for desk-side visits is reduced.

Benefits When Used with Intel® vPro™ Technology

Set a power schedule for a group of devices and track the power savings of the schedule

Securely wake PCs after hours so that systems can be kept up to date without interrupting users

Remotely diagnose and repair PCs

McAfee ePO Deep Command

10/5/2015Intel Confidential 43

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Serial Over LAN

Link:

Contact: Lance Atencio

5th generation

ePO Deep Command

• Intel® SCS

Page 44: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

Out of band management allows an administrator to connect to a computer's management controller when the computer is turned off, in sleep or hibernate modes, or otherwise unresponsive through the operating system. By way of contrast, in-band management is the classic approach used by Configuration Manager and its predecessors whereby an agent runs in the full operating system on the managed computer and the management controller accomplishes tasks by communicating with the management agent.

Benefits When Used with Intel® vPro™ Technology

Powering on one or many computers

Powering off one or many computers

Restarting a nonfunctioning computer or booting from a locally connected device or known good boot image file.

Re-imaging a computer by booting from a boot image file that is located on the network or by using a PXE server.

Reconfiguring the BIOS settings on a selected computer

Booting to a command-based operating system to run commands, repair utilities, or diagnostic applications (for example, upgrading the firmware or running a disk repair utility).

Configuring scheduled software update deployments and advertisements to wake up computers prior to running.

Microsoft System Center Configuration Manager

10/5/2015 44

SHOWCASES:

• Remote Power On

• KVM¹

• IDE-R

• Serial Over LAN

Link:

Contact: Lisa Watts

5th generation

Quick Start Guide

¹MS SCCM plug-in required²Intel® SCS plug-in for MS SCCM required

• Audit Log

• Intel® SCS²

Page 45: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

A comprehensive remote PC and network management platform based on Intel vPro technology. Transforms your business so you can gain the managed services provider benefits of recurring revenue, increased business valuation and higher technician utilization rates.

Benefits When Used with Intel® vPro™ Technology

Manage multiple networks and sites from a single interface

Monitor every desktop, server and network device

Control any device anytime, anywhere

Generate reports to speed up troubleshooting & demonstrate value

Protect all network endpoints with enterprise-class security

Automate more tasks with automated self-healing

Provide proactive patch management across one or many distributed networks

Protect data with fast, simple, reliable backup and recovery

N-able N-central

10/5/2015 45

SHOWCASES:

• Remote Power On

• IDE-R

• Serial Over LAN

Link:

Contact: Dena Lumbang

N-Able RMM

4th generation

Page 46: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

VNC Viewer Plus allows users to connect to PCs with Intel® Core™ vPro™ processor family remotely, even when out of band. When connecting to a VNC server in-band, users can perform file transfers, remote printing, chat, and more.

Benefits When Used with Intel® vPro™ Technology

Able to connect even if the computer is powered off , or has no functioning operating system

Diagnose complex issues, such as OS failures and boot problems, remotely

Remotely perform a hardware reset

Protect PCs from connection snooping, man-in-the-middle attacks, and packet-tampering attacks

Reboot from a remote CD or image

RealVNC VNC Viewer Plus

10/5/2015 46

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

Link:

Contact: Amit Tarberg

4th generation

VNC Viewer Plus

Page 47: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

Spiceworks is network management software and help desk software designed for networks with up to 1,000 devices. It combines help desk software, network inventory, network monitoring, IT reporting, and network configuration management. Spiceworks enables the user to quickly and conveniently inventory the hardware, software, and patches that reside on the network.

Benefits When Used with Intel® vPro™ Technology

Set a power schedule for a group of devices and track the power savings of the schedule

Securely wake PCs after hours so that systems can be kept up to date without interrupting users

Remotely diagnose and repair PCs

Spiceworks IT

10/5/2015 47

Link:

Contact: Dena Lumbang

5th generation

Spiceworks IT

SHOWCASES:

• Remote Power On

• KVM

• IDE-R

• Serial Over LAN

• Intel® SCS

• Win 8.1 (MDM)

Page 48: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Manageability

Symantec Client Management Suite powered by Altiris enables administrators to deploy, manage, and troubleshoot systems from virtually anywhere, virtually anytime. It enables remote patch control (in any OS state), software delivery, application management, and problem diagnostics and resolution.

Benefits When Used with Intel® vPro™ Technology

Perform secure out-of-band management in any power or OS state on wired and wireless platforms

Take hardware inventory from any power or OS state

Control power from any power state

Perform IDE redirection to boot non-native drives for diagnostics and repair

Perform remote diagnostics/repair and BIOS management via monitor and keyboard redirection

Symantec Client Management Suite

10/5/2015 48

SHOWCASES:

• Remote Power On

• KVM

• Intel® SCS

Link:

Contact: Johanna Holopein

5th generation

Client Management Suite

Page 49: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

36pt Intel Clear Section Break Page Example

10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 49

Compute Model Flexibility

Page 50: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Secure Client Virtualization

Protect virtual and physical environment from malware and rootkits

Validate the behaviors of key components of client system at startup to prevent attacks

Establish HW based root of trust for measured launch environment

Hardening the hypervisor with Citrix XenClient* XT

Intel Confidential • For Use Under NDA Only • Do Not Forward 50

Intel® Trusted Execution Technology (TXT)

10/5/2015

Page 51: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® GVT: A High Performance Graphics Virtualization Solution on Intel® Processor Graphics

10/5/2015 51

Example GPU Accelerated Tasks

Video Playback/Edit

Web Experience

Office Productivity

User Interface

Computer Aided Design

Weather Broadcast

Use Cases

Virtual Data Center

Cloud

Remote Virtual Desktop

Rich Virtual Client

Bring Your Own Device

Multi-Screen Infotainment

Secure e-Payment

VM

VM

VM

App

App

App

Hyp

erv

iso

r

3D Graphics

Media

Compute

Page 52: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Virtualization

vSentry is built on the Bromium MicrovisorTM – a small, security-focused hypervisor powered by the Xen hypervisor that automatically and invisibly hardware-isolates each untrustworthy task – one that is processing data or executing code from an untrustworthy source –in a micro-VM that cannot modify Windows or gain access to enterprise data or networks. vSentry protects enterprise desktops that haven’t been patched and eliminates costly remediation by automatically discarding malware.

Benefits When Used with Intel® vPro™ Technology

Improved virtual machine performance taking advantage of Intel® Virtualization Technology and acceleration of nested hypervisors with Intel® VMCS Shadowing.

Bromium vSentry

10/5/2015 52

SHOWCASES:

• Intel GVT

• VMCS Shadowing

Link:

Contact: Dena Lumbang

5th generation

vSentry

Page 53: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

Intel Confidential • For Use Under NDA Only • Do Not Forward

Intel® vPro™ Application Marketing Guide

Optimized for Intel

Virtualization

Citrix XenClient extends the benefits of desktop virtualization to simplify the delivery and management of mobile client environments. People can work from anywhere, at any time—even offline—for exceptional flexibility and productivity. IT gains new levels of security, reliability and control as well as simplified desktop management.

Benefits When Used with Intel® vPro™ Technology

XenClient is optimized to run on Intel® Virtualization Technology

XenClient will be the first Type 1 hypervisor to support nested hypervisor acceleration with Intel® VMCS-Shadowing. With this, multiple hypervisors can be run on a single system, such as McAfee DeepSafe being nested with XenClient

Improved virtual machine performance with the Intel® Core™ vPro™ Platform

Citrix XenClient Enterprise

10/5/2015 53

SHOWCASES:

• Intel GVT

• VMCS Shadowing

Link:

Contact: Dena Lumbang

4th generation

XenClient

Page 54: Enabled Applications Marketing Guide Q1 2015 · 2015-10-05 · Enabled Applications Marketing Guide Q1 2015. ... • Convenient and quick docking • Secure connection with remote

10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 54